Threat Hunting March 21, 2017 Understanding Cyber Threat Hunting 3 min read - When implementing threat hunting programs for the first time, IT teams should start with basic concepts, then add more capabilities gradually.
Threat Intelligence March 13, 2017 Enticing Clicks With Spam 5 min read - According to the upcoming IBM X-Force Threat Intelligence Index, the creation of new TLDs is generating new ways for fraudsters to distribute spam.
Threat Intelligence March 9, 2017 Showcasing Threat Intelligence at IBM InterConnect 3 min read - At InterConnect 2017, experts will demonstrate how IBM is applying Watson for Cyber Security to take threat intelligence to the next level.
Security Services March 8, 2017 Information Overload — Now What? 3 min read - Too many security solutions can generate information overload, but a unified managed security services solution can help IT teams reduce the noise.
Intelligence & Analytics March 7, 2017 The Role of the Security Intelligence Analyst and the Three Main Elements of Cybersecurity 3 min read - Security intelligence analysts must know the three elements of cybersecurity — threat intelligence, event intelligence and enrichment — to thwart threats.
Malware March 1, 2017 GootKit Developers Dress It Up With Web Traffic Proxy 6 min read - X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.
Intelligence & Analytics February 23, 2017 Connecting the Dots With the IBM Cognitive SOC and Watson for Cyber Security 5 min read - With IBM's Cognitive SOC and Watson for Cyber Security, analysts can detect and respond to incidents that traditional threat intelligence platforms miss.
CISO February 20, 2017 Can You Inoculate Your Organization Against Cybercrime? 3 min read - A cybersecurity immune system can "inoculate" your organization against attacks by ingesting and using the latest threat intelligence.
Incident Response February 15, 2017 Before, During and After: Dealing With Attacks and Applying Effective Incident Management 3 min read - A planned, communicated, rehearsed and organizationally tailored incident management program is central to an effective security strategy.
Intelligence & Analytics February 14, 2017 For the Love of SIEM 3 min read - Not feeling the love from your SIEM solution? Integrate it with existing tools to best fit the unique needs and goals of your business.